Faculty & Research Staff
CERIAS involves over
100 researchers from across Purdue’s four campuses including
7 colleges and
25 departments.
F = CERIAS Fellow
-
Abdel-Khalik, Hany
-
Aggarwal, Vaneet
-
Akdere, Mesut
-
Alge, Bradley
-
Aliaga, Daniel
-
Anderson, James
F
-
Aref, Walid
-
Atallah, Mike
F
-
Babintseva, Ekaterina
-
Bagchi, Saurabh
F
-
Bera, Aniket
-
Bermel, Peter
-
Bhargava, Bharat
F
-
Bhatt, Smriti
-
Bianchi, Antonio
-
Blocki, Jeremiah
-
Boyd, Josh
-
Brinton, Christopher
-
Brunswicker, Sabine
-
Caldwell, Barrett
-
Calix, Ricardo
-
Celik, Berkay
-
Chaturvedi, Alok
-
Chen, Victor (Yingjie)
-
Cleveland, William
-
Clifton, Chris
F
-
Davis, Jamie
-
Deadman, Robert
-
Dejoie, Roy
-
DeLaurentis, Dan
F
-
Delaware, Benjamin J
-
Delp, Edward
F
-
Durresi, Arjan
-
Elliott, Stephen
F
-
Evans, Jeffrey
-
Fahmy, Sonia
-
Feng, Yiheng
-
Fonseca, Pedro
-
Frueh, Carolin
-
Gao, Jing
-
Garman, Christina
-
Ghafoor, Arif
F
-
Ghodsi, Zahra
-
Gleich, David
-
Goldwasser, Dan
-
Grama, Ananth
-
Guo, Xiaonan
-
Gupta, Vijay
-
Hacker, Tom
-
Hands, Nicole
-
Hartman, Nathan
-
Hwang, Inseok
-
Inouye, David
-
Jagannathan, Suresh
-
Jia, Yanxue
-
Johnson, Mary
-
Jung, Changhee
-
Justice, Connie
-
Karabiyik, Umit
-
Kate, Aniket
-
Kisselburgh, Lorraine
F
-
Krogmeier, James
-
Kulkarni, Milind
-
Lerums, James
-
Li, Feng
-
Li, Ninghui
F
-
Lin, Guang
-
Lin, Xiaojun
-
Love, David
-
Lu, Yung-Hsiang
-
Machiry, Aravind
-
Maji, Hemanta
-
Martino, Lorenzo
-
Matei, Sorin
-
Moh, Tzuong-Tsieng
-
Mott, John
-
Mou, Shaoshuai
-
Nadig, Deepak
-
Neville, Jennifer
-
Nof, Shimon
-
Panchal, Jitesh
-
Panigrahi, Suranjan
-
Paré, Philip
-
Park, Kihong
-
Payer, Mathias
-
Peng, Chunyi
-
Pitts, Brandon
-
Prabhakar, Sunil
-
Pradhan, Romila
-
Proctor, Robert
F
-
Qiu, Xiaokang
-
Raghunathan, Vijay
-
Rao, Sanjay
-
Raskin, Victor
F
-
Rawles, Phillip
-
Ribeiro, Bruno
-
Richards, Grant
-
Rogers, Marcus K.
F
-
Rompf, Tiark
-
Salvo, Michael
-
Samanta, Roopsha
-
Seigfried-Spellar, Kathryn
-
Sen, Shreyas
-
She, Yu
-
Siskind, Jeffrey
-
Spafford, Gene
F
-
Springer, John
-
Su, Lu
-
Sun, Dengfeng
-
Sun, Wenhai
-
Sundaram, Shreyas
-
Sypher, Howard
-
Szpankowski, Wojciech
-
Tan, Lin
-
Taram, Mohammadkazem
-
(Taylor) Rayz, Julia
F
-
Tian, Dave (Jing)
-
Torres-Arias, Santiago
-
Tsoukalas, Lefteri
-
Tu, Manghui "Michael"
-
Ukkusuri, Satish
-
Vhaduri, Sudip
-
Vijaykumar, T.N.
-
Wagstaff, Samuel
F
-
Wang, Chih-Chun
-
Ward, Mark Daniel
-
Wei-Kocsis, Jin
-
Whittinghill, David
-
Wu, Wenzhuo
-
Xi, Bowei
-
Xu, Dongyan
F
-
Yang, Baijian "Justin"
-
Yih, Yuehwern
-
Zhang, Xiangyu
-
Zikas, Vassilis
-
Zou, Xukai
Departments
-
Dan DeLaurentis
F
design of systems of systems, situational awareness
-
Carolin Frueh
situational awareness (satellites, debris and near earth objects, ground surveillance), object 3d formation from image/video (shape inversion), satellite guidance, navigation and control, astrodynamics, sensor tasking, low observability systems, information quantification and retrieval.
-
Inseok Hwang
controlling multiple-vehicle systems, analysis of multiple dynamical systems which have inherently decentralized structures, path planning (computing optimal
trajectories of vehicles from starting positions to destinations) and conflict detection and resolution
-
Shaoshuai Mou
multi-agent networks; distributed control; uas cooperation; autonomy
-
Dengfeng Sun
systems, control, and optimization; resilient cyber-physical systems; unmanned aerial vehicle systems; intelligent transportation systems.
-
Mary Johnson
sustainability analysis in aviation, aviation emissions analysis, aviation fuels testing and analysis, general aviation data analysis, strategic justification of technologies, and enterprise performance and improvement.
-
John Mott
statistical process modeling and simulation,
aviation applications of bayesian inference,
acquisition and analysis of distributed transportation data
-
Lorraine Kisselburgh
F
communication and emerging technologies; privacy in social contexts; geolocational privacy; privacy and security policy; social networks; collaboration in networks; gender in stem careers; digital identities
-
Josh Boyd
online security communication, rhetorical theory and criticism, public relations, trust.
-
Sorin Matei
collaborative implications of location aware technologies, on-line social interaction and communities.
-
Howard Sypher
software diffusion, communication, time and technology, e-health web site usability, digital identity
-
Arjan Durresi
networking & security
-
Xukai Zou
communication networks and security, applied cryptography, security and reliability for grid computing, wireless network security
-
Smriti Bhatt
cyber security and information assurance, security and privacy in cloud-enabled internet of things (ce-iot), access control and communication control models and architectures, cloud computing and internet of things (iot) security, cyber security education, stem education
-
Robert Deadman
technology use in academic dishonesty detection and prevention, use of virtual networks and software defined networking
-
Tom Hacker
high performance computer, grid computing, operating systems, and distributed systems
-
Nicole Hands
application of basic cybersecurity principles of confidentiality, integrity and availability to cyber pedagogy (teaching best practices) as well as to academic honesty.
-
Umit Karabiyik
digital forensics, cybersecurity, user and data privacy, artificial intelligence, computer and network security
-
James Lerums
information security, cyber forensics, cyber security operations, social economic and legal aspects of information security, “right-sizing” cyber security solutions and implementations, cyber warfare, cyber risk, cyber exercises, physical security exercises
-
Deepak Nadig
network security
ai/ml applications to networking
cloud-native infrastructure
-
Romila Pradhan
-
Phillip Rawles
network systems administration, enterprise network management, and network application architectures
-
Marcus K. Rogers
F
psychological profiling, applied cyber-forensics,
cyber-terrorism
-
Kathryn Seigfried-Spellar
behavioral analysis of digital evidence
personality & motivation of cyberdeviants
code of ethics in digital forensics
-
John Springer
biomedical high performance computing, biomedical information assurance and security
-
Wenhai Sun
data security and privacy, decentralized trust and infrastructure, cyber-physical system security, and applied cryptography
-
Julia (Taylor) Rayz
F
natural language understanding, knowledge discovery and representation, computational recognition of salient information in texts, uncertainty management
-
Sudip Vhaduri
leading interdisciplinary collaborative research teams consisting of researchers from a range of disciplines, including sociology, psychology, medical sciences, laryngology, otolaryngology, speech-language pathology, communication sciences and disorders, health sciences, behavioral sciences, statistics, mathematics, and electrical engineering
-
Jin Wei-Kocsis
cyber-physical system cyber security artificial intelligence biologically inspired intelligent system design smart energy systems. cognitive networking design
-
Baijian "Justin" Yang
information security, end system security, network security, security policies; mobile computing, distributed computing.
-
Xiaonan Guo
cyber security and privacy
security in mobile devices
iot security, intrusion detection using wifi for smart homes
mobile healthcare and large data analysis on mobile devices
-
Connie Justice
network security, security design, risk assessment
-
Feng Li
network security, trust issues in networks, fault-tolerance
-
Victor (Yingjie) Chen
interactive systems, visual analytics, interactive information visualization, visual provenance
-
Nathan Hartman
long-term archival (lotar) for cad data
model-based definition
graphics standards
-
David Whittinghill
visualization, games, agent-based modeling, digital anti-tampering, robotics, pharmaceuticals, and web development
-
Ricardo Calix
machine learning, automatic understanding of human behavior, biometrics, intrusion detection systems, and natural language processing
-
Manghui "Michael" Tu
information assurance, digital forensics, distributed computing, sustainable computing
-
Daniel Aliaga
computer graphics, computer vision, visualization
-
Walid Aref
database technologies for emerging applications, spatial/multimedia/genomics/sensor-based databases, data mining, scalable media servers, gis.
-
Mike Atallah
F
assurable software and architecture
identification, authentication, privacy
cryptology and rights management
-
Aniket Bera
computer graphics, augmented intelligence, social robotics, autonomous agents, cognitive modeling
-
Bharat Bhargava
F
assurable software and architecture
enclave and nework security
identification, authentication, privacy
-
Antonio Bianchi
computer security
mobile security
android
binary analysis
ctf
-
Jeremiah Blocki
human authentication, cryptography, data privacy
-
Berkay Celik
design and evaluation of security for software and systems, safety, security and privacy of iot systems.
-
William Cleveland
statistics, data visualization, machine learning,
massive datasets, computer networking, cybersecurity
-
Chris Clifton
F
privacy issues in information management, data mining, data security, database support for text, and heterogeneous databases.
-
Benjamin J Delaware
program synthesis and verification, mechanized reasoning, verified systems software, decision procedures, advanced modularity
-
Sonia Fahmy
network security, including network monitoring, detection of distributed denial of service attacks, and firewall testing
-
Pedro Fonseca
operating systems, hypervisors and distributed systems
-
Christina Garman
practical and applied cryptography, namely the design and analysis of real world cryptographic systems
-
David Gleich
high performance and large scale computations with a focus on enabling previously infeasible analysis of data from biology, social networks, and scientific simulations
-
Dan Goldwasser
natural language processing and machine learning, with a specific interest on natural language semantics
-
Ananth Grama
parallel and distributed computing architectures, algorithms, and applications
-
Suresh Jagannathan
programming languages - design, implementation, and analysis
-
Changhee Jung
compilers and computer architecture with an emphasis on performance, reliability, and security
-
Aniket Kate
privacy enhancing technologies, anonymity, accountability, applied cryptography, payment networks and cryptocurrencies, trusted computing, distributed trust, multi-party computation, post-quantum cryptography
-
Ninghui Li
F
access control, trust management, security in distributed systems, applied cryptography
-
Hemanta Maji
cryptography and algorithms; with special emphasis on secure computation and information-theoretic cryptography.
-
Lorenzo Martino
service-oriented architectures, software as a service
-
Jennifer Neville
data mining and machine learning for relational data, fraud detection, social networks
-
Kihong Park
scalable qos provisioning in ip internets, self-similar and multimedia traffic control, and network security and fault-tolerance. his research is supported by grants from both government and industry, including nsf, darpa, and cerias
-
Mathias Payer
research interests: system security, exploitation, sfi, and virtualization.
-
Chunyi Peng
chunyi peng's research interests are in the broad areas of mobile networking, system and security, with a recent focus on 4g/5g mobile network architecture, protocols, and technologies for emerging/demanding applications, mobile network/system security, network data analytics, and mobile sensing and computing systems.
-
Sunil Prabhakar
issues in large-scale, distributed applications such as multimedia databases, data warehouses, and digital libraries
-
Bruno Ribeiro
data mining, network science, computer networks, statistical models & inference
-
Tiark Rompf
applied and fundamental aspects of programming languages and compilers: language design, program analysis, program transformation, program generation and synthesis, type systems, semantics. pl technology in data
management, machine learning, and ai.
-
Roopsha Samanta
program verification, repair and synthesis
-
Gene Spafford
F
executive director emeritus, cerias. security policy, intrusion detection and response, security architecture, computer forensics, vulnerability analysis, counterintelligence/counterespionage
-
Wojciech Szpankowski
analysis of algorithms, data compression, information theory, analytic combinatorics, random structures, networking, stability problems in distributed systems, modeling of computer systems and computer communication networks, queueing theory, and operations research
-
Lin Tan
software engineering, software dependability, defect detection and repair, and software text analytics
-
Mohammadkazem Taram
microarchitectural attacks, high-performance mitigations, and architecture support for security and privacy
-
Dave (Jing) Tian
embedded systems, operating systems, and trusted computing
-
Samuel Wagstaff
F
cryptography, parallel computation, and analysis of algorithms, especially number theoretic algorithms.
-
Dongyan Xu
F
virtualization and security, cloud computing, malware defense, cyberinfrastructure, distributed systems
-
Xiangyu Zhang
software provenance, malware defense
-
Vassilis Zikas
cryptography, computer security, blockchain technologies, cryptocurrencies, game theory, distributed computing
-
Saurabh Bagchi
F
dependable distributed systems, network security, reliable high performance computing, embedded wireless networks, bioinformatics.
-
Peter Bermel
several applications of nanophotonics, including photovoltaics, lighting, thermal physics, sources, detectors, and switches.
-
Christopher Brinton
machine learning, artificial intelligence
-
Jamie Davis
safety and security of software-centric systems
-
Edward Delp
F
digital forensics, steganography, image and video compression, multimedia security, medical imaging, multimedia systems, communication and information theory.
-
Jing Gao
data mining and machine learning
-
Arif Ghafoor
F
parallel and distributed computing, and multimedia information systems
-
Zahra Ghodsi
trustworthy machine learning, applied cryptography
-
Vijay Gupta
communications, networking, signal and image processing, power and energy systems, automatic controls
-
David Inouye
deep distribution alignment
generative probabilistic models
explainable ai
invertible deep learning
iterative/local learning
distribution shift
-
James Krogmeier
signal processing for wireless communications, adaptive filtering and equalization, synchronization, modulation and coding for nonlinear channels, intelligent transportation systems
-
Milind Kulkarni
my research interests lie in the areas of programming languages, compilers and systems. specifically, i am interested in various language features, compiler techniques and run-time system support that will be necessary to unlock the potential of emerging, complex computation platforms such as multicore processors, heterogeneous architectures, sensor networks and distributed systems.
-
Xiaojun Lin
power-grid reliability, renewable integration, demand response and distributed coordination, cyber-physical security for smart grid, communication networks, online algorithms
-
David Love
communications theory, communication systems with feedback, coding theory, information theory, wireless communications, applications of subspace packings
-
Yung-Hsiang Lu
yung-hsiang lu is a professor at the school of electrical and computer engineering and department of computer science. his research areas include computer vision, cloud computing, and big data. his research team is building a software infrastructure analyzing the vast amounts of video data from network cameras deployed worldwide. he is an acm distinguished scientist and speaker. he is the scientific adviser and a co-founder of perceive inc, a technology startup for video analytics. he received phd from stanford university.
-
Aravind Machiry
program analysis, vulnerability detection, iot, trustzone, binary analysis, general system security, machine learning
-
Suranjan Panigrahi
intelligent decison support systems using artificial intelligent techniques including machine learning
innovative products/processes for social challenges in low resource settings via interdisciplinary team approach
smart sensors/sensing systems for automation, quality control, detection and diagnosis applications
-
Philip Paré
mathematical modeling of dynamic networked systems, e.g. epidemiological, biological, economic systems, infrastructure networks, social networks, etc.; stability analysis, control, and identifiability of such systems; model reduction of dynamic systems and clustering; biological applications of control theory
-
Xiaokang Qiu
programming systems, including program logics, decision procedures, automated deduction, program verification, and program synthesis
-
Vijay Raghunathan
wireless and ad hoc networks, sensor networks, intrusion detection, reliability
-
Sanjay Rao
peer-to-peer system design, cloud systems, security issues in system migration
-
Shreyas Sen
sensing and communication circuits/systems, energy-harvested sensor nodes for internet of things (iot), analog/rf, wireless, security, human body-coupled communication
-
Jeffrey Siskind
artificial language, cognitive science, machine vision, computational linguistics, computer systems (including visual event perception, computational models of child language acquisition) and high performance compilation strategies for lisp.
-
Lu Su
i am broadly interested in the general areas of internet of things, cyber-physical systems, wireless, mobile, and crowd sensing systems, big data and cloud computing, data mining and machine learning, as well as security and privacy.
-
Shreyas Sundaram
analysis, design, and control of resilient and secure large-scale networked systems
-
Santiago Torres-Arias
iot security, software supply chain security, cloud security, applied crypto
-
T.N. Vijaykumar
computer architecture with emphasis on microarchitectures of general-purpose, high-performance microprocessors.
-
Chih-Chun Wang
network coding, coding theory, information and communication theory, signal processing, control theory
-
Ekaterina Babintseva
history of science and technology and the intersections of human sciences and computing
-
Vaneet Aggarwal
cloud computing, video streaming, communications and networking, machine learning, and smart grids.
-
Barrett Caldwell
situational awareness, privacy, critical infrastructure protection, human factors
-
Shimon Nof
computer-supported integration and collaboration of distributed work
-
Brandon Pitts
cognitive ergonomics,
human-automation interaction,
multimodal/multisensory information processing,
adaptive displays,
aging and technology
-
Yu She
robotics, mechanism design, tactile perception
-
Wenzhuo Wu
nanomanufacturing, self-powered nanosystems, renewable energy, human-integrated technologies, smart sensors and electronics
-
Yuehwern Yih
health supply chains, machine learning and artificial intelligence
-
Victor Raskin
F
computational linguistics, ontological semantics, meaning-based search, steganography
-
Yiheng Feng
developing innovative modeling techniques, control strategies, and evaluation methods with a focus on the interactions between smart transportation infrastructure and connected and automated vehicles (cavs) for the next generation transportation system
-
Satish Ukkusuri
cyber-transportation modeling, interdependent resilience analysis, network science and network games
-
Bradley Alge
human/technology interaction, employer/employee rights, strategic human resources, individuals as self-regulators
-
Alok Chaturvedi
homeland security simulations (e.g., "measured response"), synthetic environments, tera-scale grid computing, computational models of human behaviors, enterprise systems, artificial intelligence applications in manufacturing, machine learning, and visualization of business data.
-
Roy Dejoie
social/ethical/legal issues, group support systems, collaborative technologies
-
Guang Lin
big data analysis and statistical machine learning
predictive modeling and uncertainty quantification
scientific computing and computational fluid dynamics
stochastic multiscale modeling
-
Tzuong-Tsieng Moh
public key cryptography, jacobian conjecture, and resolution of singularities
-
Guang Lin
big data analysis and statistical machine learning
predictive modeling and uncertainty quantification
scientific computing and computational fluid dynamics
stochastic multiscale modeling
-
Jitesh Panchal
decision making in engineering design; secure co-design; mechanism design for systems engineering; complex networks; open innovation; crowdsourcing.
-
Hany Abdel-Khalik
validation and uncertainty quantification;
big data analytics and data assimilation;
cyberattack-resilient control systems;
lwr computational reactor physics;
-
Lefteri Tsoukalas
intelligent systems and control methodologies
-
James Anderson
F
use of information technology in health care, e-healthcare, aids/std prevention
-
William Cleveland
statistics, data visualization, machine learning,
massive datasets, computer networking, cybersecurity
-
Guang Lin
big data analysis and statistical machine learning
predictive modeling and uncertainty quantification
scientific computing and computational fluid dynamics
stochastic multiscale modeling
-
Jennifer Neville
data mining and machine learning for relational data, fraud detection, social networks
-
Mark Daniel Ward
analysis and design of algorithms and data structures, analytic combinatorics, applied probability, asymptotics, data compression, game theory, information theory, pattern matching, probability theory, probability and analysis, random structures, random walk, symbolic computation, tree structures
-
Bowei Xi
computer science and statistics (data mining, machine learning, computer networks, massive/high dimensional data, computational methods for statistics
-
Mesut Akdere
human resource development
leadership development
stem workforce development
-
Sabine Brunswicker
social analytics & social data visualization, social computing, smart energy & blockchain
-
Stephen Elliott
F
biometrics, signature verification, mobile computing, electronic and mobile commerce logistics and supply chain management